Results 141 to 150 of about 22,394,325 (191)
Some of the next articles are maybe not open access.
A Security Architecture for Data Privacy and Security
2005 IEEE Conference on Emerging Technologies and Factory Automation, 2006Data access and software exchange are often achieved over insecure networks such as the public Internet. System designers are therefore forced to be proactive with regard to verifying the identity of both human users and software processes that request access to protected resources such as factory data. In this paper we show a new security architecture
openaire +2 more sources
Computer Law & Security Review, 2002
Abstract This article considers the impact of recent regulation on the storage and use of personal information. The article is based on issues raised at an “e-business at CR” breakfast seminar held on 2 November 2001.
David Berry, Peter Carey
openaire +2 more sources
Abstract This article considers the impact of recent regulation on the storage and use of personal information. The article is based on issues raised at an “e-business at CR” breakfast seminar held on 2 November 2001.
David Berry, Peter Carey
openaire +2 more sources
Ensure Hierarchal Identity Based Data Security in Cloud Environment
International Journal of Cloud Applications and Computing, 2019Cloud computing has emerged as a new promising field in the internet. It can be thought as a new architecture for the next generation of IT enterprises. It allows the user to access virtualized resources over the internet which can be dynamically scaled.
S. Kaushik, C. Gandhi
semanticscholar +1 more source
Data Security and Privacy in Fog Computing
IEEE Network, 2018Cloud computing is now a popular computing paradigm that can provide end users access to configurable resources on any device, from anywhere, at any time. During the past years, cloud computing has been developed dramatically.
Yunguo Guan+3 more
semanticscholar +1 more source
An improved attribute‐based encryption technique towards the data security in cloud computing
Concurrency and Computation, 2019With the rapid development of the Internet, resource and knowledge sharing are two major problems experienced due to the presence of many hackers and malicious users.
Suyel Namasudra
semanticscholar +1 more source
PerfectDedup: Secure Data Deduplication [PDF]
With the continuous increase of cloud storage adopters, data deduplication has become a necessity for cloud providers. By storing a unique copy of duplicate data, cloud providers greatly reduce their storage and data transfer costs. Unfortunately, deduplication introduces a number of new security challenges.
Puzio, Pasquale+3 more
openaire +1 more source
2003
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire +2 more sources
In Chapter 4, we combined the concepts from Chapter 1, the framework design from Chapter 2, and the technologies from Chapter 3 to create about half of the CSLA .NET framework. In this chapter, we’ll continue the process, completing implementation of the remaining classes.
openaire +2 more sources
2010
In this chapter, we talk all about security and securing your BlackBerry data. Most of us keep very important information on our devices and would want to be prepared, just in case.
Gary Mazo, Martin Trautschold
openaire +2 more sources
In this chapter, we talk all about security and securing your BlackBerry data. Most of us keep very important information on our devices and would want to be prepared, just in case.
Gary Mazo, Martin Trautschold
openaire +2 more sources
Designing Secure Data Warehouses
2006Organizations depend increasingly on information systems, which rely upon databases and data warehouses (DWs), which need increasingly more quality and security. Generally, we have to deal with sensitive information such as the diagnosis made on a patient or even personal beliefs or other sensitive data.
Rodolfo Villarroel+3 more
openaire +1 more source
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire +2 more sources
This paper focuses on recent data breaches of two differing entities, Target (2013) and the U.S. Office of Personnel Management (2015). The number of accounts and people, as well as the personally identifiable financial information (PIFI) and personally identifiable information (PII), affected are discussed.
openaire +2 more sources